CN104782096A - Vicinity-based multi-factor authentication - Google Patents
Vicinity-based multi-factor authentication Download PDFInfo
- Publication number
- CN104782096A CN104782096A CN201280077091.8A CN201280077091A CN104782096A CN 104782096 A CN104782096 A CN 104782096A CN 201280077091 A CN201280077091 A CN 201280077091A CN 104782096 A CN104782096 A CN 104782096A
- Authority
- CN
- China
- Prior art keywords
- unit
- wireless device
- reference unit
- distance
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B1/00—Comparing elements, i.e. elements for effecting comparison directly or indirectly between a desired value and existing or anticipated values
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention relates to a wireless device, configured for ensuring authentication of a user, to a reference unit configured for ensuring authentication of a user of the wireless device and to a method for ensuring authentication of a user. The wireless device (1) comprises a checking unit (2) configured for scanning a distance to a reference unit (3) and for checking if the distance scanned lies within a predetermined range such that authentication of the user is ensured. In this way, a wireless device is provided which is simple and cost-effective to realize and increases security by making sure that the rightful owner is available without the need of asking for PIN codes, passwords or other measures, such as biometric recognition, i.e. voice recognition, fingerprint recognition, retina recognition and the like.
Description
Technical field
The application relates to a kind of wireless device, and it is arranged to the certification guaranteeing user.
Background technology
The wireless device of such as smart mobile phone etc. instead of other articles for daily use various that the individuals such as door key that to get home from credit card carry with more and more.Typically, by pressing close to the receiver brush mobile device such as such as mobile phone and input PIN code or password alternatively on mobile phone once, door just can be opened or from shops for goods.If smart mobile phone is stolen somewhere or lost, anyone finding it can represent legal owner and carry out paying or opening the door.In order to the user that certification is correct, the safety measure also requiring some extra instead of only have the ownership of smart mobile phone.At every turn the simple solution of usual one on equipment, uses PIN code or password when using equipment, but because this require user interactions and respectively other memory cipher or PIN code therefore this is quite loaded down with trivial details.Further, onlooker may see password or identify PIN code, and if he or she has stolen mobile phone, he or she can utilize mobile phone and password each affairs of certification.
Summary of the invention
The object of this invention is to provide a kind of possibility for authenticated user with enhancing fail safe, it should implement simple and cost effective, avoid accessing to your password simultaneously, PIN code or such as such as voice recognition, fingerprint recognition or retina identification other means of bio-identification etc.
This purpose is reached by the theme of independent claims.Preferred embodiment defines in the dependent claims.
According to a first aspect of the invention, by configure user, this purpose guarantees that the wireless device of user authentication realizes, this wireless device comprises inspection unit, this inspection unit is arranged to the distance of scanning and reference unit, and whether be positioned at preset range for the distance checking described scanning, to make the certification guaranteeing user.
Thought of the present invention is between execution two unit, the inspection unit of such as wireless device and be not wireless device a part reference unit between contiguously to measure.This thought is based on such fact: two unlikely stolen or loss simultaneously of the unit be separated.After this, analysis to measure result is to check whether the certification of user should go through.This wireless device is mobile device or other equipment such as such as wrist-watch or jewelry etc. such as corresponding smart mobile phone or such as cell phone preferably.This inspection realizes preferably by use radiotechnics, such as radio frequency identification (being called for short RFID), near-field communication (being called for short NFC), application, bluetooth, ZigBee or similar technology.Term " scanning distance " means the distance between measurement two unit, and wherein this measurement can perform in different ways.Preferably, perform this measurement according to specific time predefined interval, wherein time predefined interval itself is repeated with equidistant or non-isometric step-length, or constantly performs measurement.Also one-shot measurement may be performed based on user action during the predefine period.
According to a preferred embodiment of the present invention, inspection unit is configured for challenge response (challenge-protocol) agreement running encryption further, encrypted challenge response protocol scanning and ask reference unit to adopt shared secret to encrypt during the distance of reference unit mark that (shared secretcryptography) and/or public-key encryption (public key cryptography) prove it, to guarantee that wireless device and reference unit are assigned to each other.Because reference unit preferably adopts private key or shared secret encryption to sign to a part of data that inspection unit provides, therefore wireless device is reliable.Preferably by adopting its private key to carry out signing, reference unit proves that it is the lawful owner of public keys mark.Preferably, the public keys mark of this encrypted challenge response protocol request reference unit, and the public keys of this reference unit mark is marking matched with the public keys be stored in inspection unit.By this coupling, preferably ensure that and do not have assailant can disguise oneself as into reference unit, because by inquire PIN code or inquiry password in addition or by scanning the object closely pressed close to identify the predefine space characteristics of this object, verify the equipment having occurred there is correct mark (being called for short ID).
According to a preferred embodiment of the present invention, select preset range by adopting pairing inspection unit and reference unit in this way, which and inspection unit asked the position of reference unit before calculating the distance between inspection unit and reference unit.Term " position " relates to " absolute position ", but also can relate to " relative position " according to actual environment or situation.This pairing also can be applied in bluetooth applications also referred to as in Bluetooth pairing, and the first step of its work instructs such as phone: earphone associates with it; And be that earphone is instructed in the second step: this phone and its binding.
According to a preferred embodiment of the present invention, adjust described preset range by the position of the wireless power level and the described reference unit of measurement that change inspection unit place, the distance between described reference unit and described inspection unit is extracted and this distance is compared with predetermined reference data.This predetermined reference data preferably includes preset range, and the measurement before adopting pre-sets and/or be set in advance as the scope based on empirical value.Actual measurement can change this preset range, makes it be adjusted to the different range adapted to actual measured results.
According to a preferred embodiment of the present invention, inspection unit be arranged to further detect at least one safe unit be disposed in the preset range of reference unit.Therefore, do not need to access to your password while enhancing fail safe, wireless device can be checked, and multiple other safety means (be called for short ASD) are arranged in its vicinity to guarantee together with the owner that this wireless device is still legal with it.Still fail safe can be strengthened by the number increasing ASD.Wireless device preferably adopts short-range wireless electric wave and contacts with ASD.According to their ability, wireless device preferably checks that the plurality of ASD and reference unit are closely pressed close to or wireless device performs encrypted challenge response protocol to guarantee not having assailant to disguise oneself as into one of ASD.ASD is preferably integrated in other article that user carries with, such as, be integrated in wrist-watch or jewelry, or ASD is the equipment be separated, such as key card (key fob) or key chain.Preferably, at least one safe unit is arranged to and sends order to applying unit, and this applying unit is arranged to the program run and guarantee user authentication, and wherein this applying unit is integrated in described wireless device.When distance between reference unit and inspection unit or the distance between reference unit and at least one safe unit are positioned at and make user authentication failure outside preset range, inspection unit is preferably arranged to further and asks password and/or PIN code to user, and/or for performing the bio-identification of such as voice recognition, fingerprint recognition and/or retina identification.In this way, these extra measures can strengthen reliability and fail safe further.Preferably, compare with the recorded data in the database be stored on wireless device or server by the sound of recording user and by it and realize voice recognition.
According to a preferred embodiment of the present invention, at least one safe unit is in a wireless device integrated.Therefore, this wireless device can be made very compact.
According to a further advantageous embodiment of the invention, at least one safe unit is integrated in wrist-watch, jewelry, clothes, luggage, notebook, key card or key chain.Therefore, thought of the present invention be safe unit can be positioned optional position outside wireless device therefore fail safe improve further.
According to a second aspect of the invention, object above-mentioned is reached by the reference unit of the certification being arranged to the user of the wireless device guaranteed according to a first aspect of the invention, wherein this reference unit is integrated in clothes, such as cap, shirt or underwear.Therefore, not only allow reference unit to be disposed in fixing position, and can be carried with by user.
According to a third aspect of the invention we, by for guaranteeing that the method for user authentication reaches object above-mentioned, the method comprising the steps of: a) distance of scanning and reference unit, and b) check step a) in scanning distance whether be positioned at preset range, so that guarantee the certification of user.
According to a preferred embodiment of the invention, the method comprises step further: detect at least one safe unit and be disposed in the preset range of reference unit.The method preferably further comprises step: guarantee that the applying unit of the program of user authentication sends order to being arranged to run.
Accompanying drawing explanation
From the following description of the preferred embodiment provided by way of example with reference to accompanying drawing, a further object of the present invention and advantage will become obvious.In the accompanying drawings:
Fig. 1 shows wireless device according to a first advantageous embodiment of the invention;
Fig. 2 illustrates the step of the method for guaranteeing user authentication according to a second, preferred embodiment of the present invention; And
Fig. 3 schematically shows the step of method according to a second, preferred embodiment of the present invention.
Embodiment
Fig. 1 show according to a first advantageous embodiment of the invention be arranged to the wireless device guaranteeing user authentication.Wireless device 1 comprises inspection unit 2, and inspection unit 2 scans the distance with reference unit 3, and reference unit 3 is not a part for wireless device 1.Further, inspection unit 2 checks whether measured distance is positioned at preset range, to guarantee user authentication.In this first preferred embodiment, this preset range is set as empirical value.In this first preferred embodiment, inspection unit 2 is measured and the distance being positioned at the reference unit 3 outside wireless device 1, and this result and the former measurement result stored in a database is compared.According to this first preferred embodiment of the present invention, reference unit 3 corresponding to be arranged fixed position on the ground and without any need for the passive RFID chips of battery.According to another preferred embodiment of the invention, reference unit 3 is integrated in underwear.Further, inspection unit 2 detects the safe unit 4 be disposed in the preset range of reference unit 3.Ensure that measurement result is verified, which enhances fail safe in this way.Safe unit 4 is to having run program and being integrated in the applying unit 5 transmission order in wireless device 1.In the first preferred embodiment of the present invention, this application is used for opening the door.
Fig. 2 schematically shows the method for guaranteeing user authentication according to a second, preferred embodiment of the present invention.First, namely door is such as being moved towards and before performing the predetermined action such as enabling, smart mobile phone and earphone match and exchange key.Then, perform as contiguous between the inspection unit 2 in the first preferred embodiment and reference unit 3 is measured, and based on the result of this step, door is opened or refuses to be opened.Approximately, check that user is whether near door.If so, measure the distance with reference unit 3, if reference unit 3 nearby, door is opened and the method terminates to it.If door is not nearby, the method also can terminate to it.Alternatively, if no matter which kind of reason could not measure the distance with references object for, require PIN code, and if this PIN code is verified, then door is opened.Otherwise the method also terminates to it.Therefore, be improved based on the transaction of smart mobile phone and the fail safe of certification.A lot of wireless device such as such as smart mobile phone etc. has possessed various short-range wireless electric wave, and reuses that they are very simple.Further, dynamic security level is adjustable, if i.e., requirement, then after the multiple ASD of detection, requires PIN code, password further and/or performs voice recognition or similar means.
Fig. 3 schematically shows the step of method according to a second, preferred embodiment of the present invention.In a first step, the distance of (6) and reference unit is scanned.Then, checking that the distance controlling scanning in first step (6) in step (7) is whether in preset range.In further step, detect (8) at least one safe unit and be disposed in the preset range of reference unit.Finally, (9) order is sent to being arranged to the applying unit run for guaranteeing user authentication.In its most simple form, have employed an application and a bluetooth equipment.
Although illustrate and describe the present invention in detail in accompanying drawing and aforesaid description, thisly to illustrate and description is considered to illustrative or illustrative rather than restrictive; The invention is not restricted to the disclosed embodiments.
From to accompanying drawing, disclosure and the study of claim of enclosing, those skilled in the art can understand when the invention of time claim and affect other variants of the disclosed embodiments.In the claims, word " comprises " does not get rid of other unit or step, and non-limiting article "a" or "an" does not get rid of plural number.Certain measures is not shown the combination that advantageously can not utilize these measures by this simple fact of record in mutually different dependent claims.Any reference marker in claim should not be understood to limited field.
Claims (14)
1. a wireless device (1), is arranged to the certification guaranteeing user, comprises:
Inspection unit (2), is arranged to the distance of scanning and reference unit (3), and for checking whether the described distance of scanning is positioned at preset range, to make the certification guaranteeing described user.
2. wireless device according to claim 1, wherein said inspection unit (2) is arranged to the challenge response agreement running encryption further, the challenge response agreement of described encryption asks described reference unit (3) to adopt shared secret to encrypt when scanning the described distance with described reference unit (3) and/or public-key encryption proves its mark, to make to guarantee that described wireless device (1) and described reference unit (3) are assigned to each other.
3. wireless device according to claim 2, the public keys mark of reference unit (3) described in the challenge response agreement request of wherein said encryption, and the described public keys that the described public keys mark of described reference unit (3) and described inspection unit (2) place store is marking matched.
4. wireless device according to claim 1, wherein selects described preset range by matching described inspection unit (2) and described reference unit (3) in the following ways, which namely:
Described inspection unit (2) asked the position of described reference unit (3) before calculating the described distance between described reference unit (3) and described inspection unit (2).
5. wireless device according to claim 1, wherein adjust described preset range, to make the described distance extracted between described reference unit (3) and described inspection unit (2) and described distance to be compared with predetermined reference data by the wireless power level that changes described inspection unit (2) place and the position of measuring described reference unit (3).
6., according to the wireless device described in aforementioned claim, wherein said inspection unit (2) is arranged to further and detects at least one safe unit (4) and be disposed in apart from the described preset range of described reference unit (3).
7. wireless device according to claim 6, wherein said at least one safe unit (4) is arranged to and sends order to applying unit (5), described applying unit (5) is arranged to the program run and guarantee the certification of described user, and wherein said applying unit (5) is integrated in described wireless device (1).
8. the wireless device according in claim 6 and 7, when distance wherein between described reference unit (3) and described inspection unit (2) or the distance between described reference unit (3) and at least one safe unit described (4) are positioned at the authentification failure making described user outside described preset range, described inspection unit (2) is arranged to further asks password and/or PIN code from described user, and/or for performing the bio-identification of such as voice recognition, fingerprint recognition and/or retina identification.
9., according to the wireless device described in claim 6 to 8, wherein said at least one safe unit (4) is integrated in described wireless device (1).
10., according to the wireless device described in claim 6 to 8, wherein said at least one safe unit (4) is integrated in wrist-watch, jewelry, clothes, luggage, notebook, key card or key chain.
11. 1 kinds of reference units (3), be arranged to the certification of the user guaranteed according to the wireless device (1) described in claim 1 to 10, wherein said reference unit (3) is integrated in the clothes of such as cap, shirt or underwear.
12. 1 kinds, for guaranteeing the method for the certification of user, comprise step:
A) distance of (6) and reference unit (3) is scanned, and
B) check (7) step a) in scanning distance whether be positioned at preset range, to make the certification guaranteeing described user.
13. methods according to claim 12, comprise detection (8) at least one safe unit (4) further and are arranged in step in the described preset range of described reference unit (3).
14. methods according to claim 13, comprise further and send the step of (9) ordering to applying unit (5), and described applying unit (5) is arranged to the program run and guarantee the certification of described user.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2012/072837 WO2014075734A1 (en) | 2012-11-16 | 2012-11-16 | Vicinity-based multi-factor authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104782096A true CN104782096A (en) | 2015-07-15 |
Family
ID=47326076
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201280077091.8A Pending CN104782096A (en) | 2012-11-16 | 2012-11-16 | Vicinity-based multi-factor authentication |
Country Status (6)
Country | Link |
---|---|
US (1) | US9030290B2 (en) |
EP (1) | EP2920936A1 (en) |
JP (1) | JP2016506101A (en) |
CN (1) | CN104782096A (en) |
MX (1) | MX2015004817A (en) |
WO (1) | WO2014075734A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106251443A (en) * | 2016-08-01 | 2016-12-21 | 北京小米移动软件有限公司 | Method for unlocking and device |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10251059B2 (en) * | 2014-01-21 | 2019-04-02 | Everykey Inc. | Authentication device and method |
US9514295B2 (en) * | 2014-05-30 | 2016-12-06 | Cable Television Laboratories, Inc. | Quantified identity |
US20160065374A1 (en) | 2014-09-02 | 2016-03-03 | Apple Inc. | Method of using one device to unlock another device |
JP6380262B2 (en) * | 2015-06-29 | 2018-08-29 | 京セラドキュメントソリューションズ株式会社 | Authentication device |
KR101858495B1 (en) * | 2016-06-10 | 2018-05-16 | 주식회사 더레이블 | Smart locking system using bluetooth communication |
IT201600096978A1 (en) * | 2016-09-28 | 2018-03-28 | Eng Team Srl | ELECTRONIC LOCK MANAGED BY AN APPLICATION ON SMARTPHONE INCLUDING AN ELECTRONIC SYSTEM OF PREVENTIVE AUTHENTICATION OF THE SMARTPHONE OWNER |
US10728230B2 (en) * | 2018-07-05 | 2020-07-28 | Dell Products L.P. | Proximity-based authorization for encryption and decryption services |
US10498727B1 (en) | 2018-08-29 | 2019-12-03 | Capital One Services, Llc | Systems and methods of authentication using vehicle data |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080055041A1 (en) * | 2006-08-29 | 2008-03-06 | Kabushiki Kaisha Toshiba | Entry control system and entry control method |
CN101661639A (en) * | 2009-09-11 | 2010-03-03 | 王远洲 | Method and system for controlling intelligent door lock |
CN101708707A (en) * | 2009-12-08 | 2010-05-19 | 冯林 | Vehicle burglary protection system, vehicle-mounted anti-theft device and burglary protection method |
US20100201482A1 (en) * | 2009-02-10 | 2010-08-12 | William Benjamin Robertson | System and method for accessing a structure using a mobile device |
US20110314539A1 (en) * | 2010-06-18 | 2011-12-22 | At&T Intellectual Property I, L.P. | Proximity Based Device Security |
CN102684878A (en) * | 2012-04-05 | 2012-09-19 | 苏州佳世达电通有限公司 | Authentication system and authentication method based on international mobile equipment identity (IMEI) and location technology |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5659617A (en) * | 1994-09-22 | 1997-08-19 | Fischer; Addison M. | Method for providing location certificates |
DE19909140A1 (en) * | 1999-03-03 | 2000-09-21 | Daimler Chrysler Ag | Electronic distance determining device and electronic security system equipped therewith |
US20020141586A1 (en) * | 2001-03-29 | 2002-10-03 | Aladdin Knowledge Systems Ltd. | Authentication employing the bluetooth communication protocol |
US7516325B2 (en) * | 2001-04-06 | 2009-04-07 | Certicom Corp. | Device authentication in a PKI |
CN1947372A (en) * | 2004-04-23 | 2007-04-11 | 松下电器产业株式会社 | Personal information management device, distributed key storage device, and personal information management system |
JP4762190B2 (en) * | 2005-06-30 | 2011-08-31 | パナソニック株式会社 | Mobile terminal device and incoming call notification operation control method thereof |
US7791469B2 (en) * | 2005-10-11 | 2010-09-07 | O2Micro International Limited | Short range wireless tracking and event notification system for portable devices |
JP4736876B2 (en) * | 2006-03-15 | 2011-07-27 | 日本電気株式会社 | Terminal control system, information processing terminal device, terminal control method, and program |
JP2008057112A (en) * | 2006-08-29 | 2008-03-13 | Matsushita Electric Ind Co Ltd | System and program for management of entry into/exit from room |
JP4726950B2 (en) * | 2006-09-28 | 2011-07-20 | パナソニック株式会社 | Mobile phone and access control method |
JP2008210248A (en) * | 2007-02-27 | 2008-09-11 | Secom Co Ltd | Belongings monitoring system |
US8646056B2 (en) * | 2007-05-17 | 2014-02-04 | U.S. Cellular Corporation | User-friendly multifactor mobile authentication |
US8289133B2 (en) * | 2009-10-16 | 2012-10-16 | Waveshielding Co., Ltd. | Mobile-controlled electric entrance device |
JP2011094292A (en) * | 2009-10-27 | 2011-05-12 | Aiphone Co Ltd | Electric lock system |
JP2011165157A (en) * | 2010-02-10 | 2011-08-25 | Mitsuo Nakamura | Apparatus for preventing belongings from being stolen or left behind |
US8869263B2 (en) * | 2010-02-26 | 2014-10-21 | Blackberry Limited | Wireless communications system providing mobile device authentication bypass based upon user-wearable security device and related methods |
US8249556B2 (en) * | 2010-07-13 | 2012-08-21 | Google Inc. | Securing a mobile computing device |
US8995960B2 (en) * | 2012-02-10 | 2015-03-31 | Dedo Interactive, Inc. | Mobile device authentication |
-
2012
- 2012-11-16 WO PCT/EP2012/072837 patent/WO2014075734A1/en active Application Filing
- 2012-11-16 JP JP2015542174A patent/JP2016506101A/en active Pending
- 2012-11-16 MX MX2015004817A patent/MX2015004817A/en unknown
- 2012-11-16 EP EP12798637.0A patent/EP2920936A1/en not_active Withdrawn
- 2012-11-16 CN CN201280077091.8A patent/CN104782096A/en active Pending
- 2012-11-20 US US13/682,030 patent/US9030290B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080055041A1 (en) * | 2006-08-29 | 2008-03-06 | Kabushiki Kaisha Toshiba | Entry control system and entry control method |
US20100201482A1 (en) * | 2009-02-10 | 2010-08-12 | William Benjamin Robertson | System and method for accessing a structure using a mobile device |
CN101661639A (en) * | 2009-09-11 | 2010-03-03 | 王远洲 | Method and system for controlling intelligent door lock |
CN101708707A (en) * | 2009-12-08 | 2010-05-19 | 冯林 | Vehicle burglary protection system, vehicle-mounted anti-theft device and burglary protection method |
US20110314539A1 (en) * | 2010-06-18 | 2011-12-22 | At&T Intellectual Property I, L.P. | Proximity Based Device Security |
CN102684878A (en) * | 2012-04-05 | 2012-09-19 | 苏州佳世达电通有限公司 | Authentication system and authentication method based on international mobile equipment identity (IMEI) and location technology |
Non-Patent Citations (3)
Title |
---|
DA-ZHI SUN, ET AL.: "A New Design of Wearable Token System", 《IEEE TRANSACTIONS ON CONSUMER ELECTRONICS》 * |
WAYNE A. JANSEN, ET AL.: "Authenticating Users on Handheld Devices", 《PROCEEDINGS OF THE CANADIAN INFORMATION TECHNOLOGY SECURITY SYMPOSIUM》 * |
WAYNE JANSEN, ET AL.: "Proximity Beacons and Mobile Handheld Devices:Overview and Implementation", 《NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106251443A (en) * | 2016-08-01 | 2016-12-21 | 北京小米移动软件有限公司 | Method for unlocking and device |
CN106251443B (en) * | 2016-08-01 | 2019-10-25 | 北京小米移动软件有限公司 | Method for unlocking and device |
Also Published As
Publication number | Publication date |
---|---|
WO2014075734A1 (en) | 2014-05-22 |
US9030290B2 (en) | 2015-05-12 |
US20140139315A1 (en) | 2014-05-22 |
MX2015004817A (en) | 2016-02-10 |
JP2016506101A (en) | 2016-02-25 |
EP2920936A1 (en) | 2015-09-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104782096A (en) | Vicinity-based multi-factor authentication | |
US10937267B2 (en) | Systems and methods for provisioning digital identities to authenticate users | |
US9892293B1 (en) | Tamper detection system | |
EP3428818B1 (en) | Identity authentication method and system | |
RU2576586C2 (en) | Authentication method | |
US20140093144A1 (en) | More-Secure Hardware Token | |
AU2013205396B2 (en) | Methods and Systems for Conducting Smart Card Transactions | |
JP2017514421A (en) | Authentication apparatus and method | |
KR101575687B1 (en) | Biometrics user authentication method | |
US20150038118A1 (en) | Method for verifying the identity of a user of a communicating terminal and associated system | |
CN106650369B (en) | Using personal RF signatures for enhanced authentication metrics | |
US20160012408A1 (en) | Cloud-based mobile payment system | |
CN103957521B (en) | A kind of cell visitor authentication method and system based on NFC technique | |
JP5779996B2 (en) | Wireless communication system | |
US10511946B2 (en) | Dynamic secure messaging | |
KR20150050280A (en) | Authentication method using fingerprint information and certification number, user terminal and financial institution server | |
KR101240231B1 (en) | A mobile phone id card security system | |
KR20150081387A (en) | Certification System and Method For User | |
US20220386118A1 (en) | Method for proximity communication between terminals and apparatus thereof | |
US20220385654A1 (en) | Method for proximity communication between terminals and apparatus thereof | |
EP2965488B1 (en) | Method and system for preparing a communication between a user device and a server | |
JP4852961B2 (en) | Information processing system, information processing apparatus, and information processing terminal | |
WO2016059546A1 (en) | Secure authentication token | |
US20140289823A1 (en) | Methods and apparatus for non-contact radio frequency detection and automatic establishment of corresponding communication channel | |
US11003744B2 (en) | Method and system for securing bank account access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150715 |
|
WD01 | Invention patent application deemed withdrawn after publication |